/pulsar

A modular and blazing fast runtime security tool for the IoT, powered by eBPF.

Primary LanguageRustOtherNOASSERTION

Pulsar dark logo Pulsar light logo

Release License License

Pulsar is a security tool for monitoring the activity of Linux devices at runtime, powered by eBPF.

The Pulsar core modules use eBPF probes to collect events from the kernel in a safe and efficient way. Pulsar events can be categorized in the four main following areas:

  • Processes: processes information, including file execution and file opening.
  • File I/O: I/O operations on disk and memory.
  • Network: data from the network stack.

Pulsar is built with a modular design that makes it easy to adapt the core architecture to new use cases, create new modules or write custom rules.

Quickstart

Warning
A kernel 5.5 or higher with BPF and BTF enabled is required. Visit the official Pulsar website for the full requirements and installation options available.

To download and install Pulsar, run the following in your terminal:

curl --proto '=https' --tlsv1.2 -LsSf https://github.com/exein-io/pulsar/releases/latest/download/pulsar-install.sh | sh

Launch the pulsar daemon in a terminal with administrator privileges:

pulsard

That's pretty much it. At this point Pulsar is actively monitoring the activity of all the target processes, and checking it against the set of security policies defined in the rules file. You can test this by triggering a threat event, for example running the following command in another terminal:

ln -s /etc/shadow /tmp/secret

In the pulsar terminal you should see something similar to:

[2023-02-07T14:29:09Z  THREAT  /usr/bin/ln (36267)] [rules-engine - { rule_name = "Create sensitive files symlink" }] File Link { source: /tmp/secret, destination: /etc/shadow, hard_link: false }

As you can see Pulsar identifies the previous command as a threat event.

How does it work?

Behind the scenes, when an application performs an operation, it gets intercepted at kernel level by the Pulsar BPF probes, turned into a unique event object and sent to the userspace. There, the Pulsar rule engine processes the event against the set of rules defined in the rules file and, if there is a match, it emits a new event, marked as a threat. Finally a logger module prints threat events to the terminal.

In the example above, the event produced matched the following rule:

- name: Create sensitive files symlink
  type: FileLink
  condition: (payload.destination IN ["/etc/shadow", "/etc/sudoers", "/etc/pam.conf", "/etc/security/pwquality.conf"] OR payload.destination STARTS_WITH "/etc/sudoers.d/" OR payload.destination STARTS_WITH "/etc/pam.d") AND payload.hard_link == "false"

Installation

(Recommended) Using the official installation script

The recommended approach to getting started with Pulsar is by using the official installations script. Follow the guide in the Quickstart section.

Use Pre-built Binaries

Another approach to install Pulsar is by using a pre-built binary. Binaries are available for the latest release. Use pulsar-exec for x86-64 (pulsar-exec-static for a static build) or pulsar-exec-static-aarch64 for AArch64 platform. Using there approach you also need to download and setup the helper scripts to have a more convenient way to start in daemon/cli mode.

Build from source

We do not recommend build Pulsar from source. Building from source is only necessary if you wish to make modifications. If you want to play with the source code check the Developers section of the documentation.

Resources

  • Read the docs: understand how to install and set up Pulsar.
  • Concepts: dive deep into Pulsar architecture and main concepts.
  • Tutorials: learn how to use Pulsar with practical examples.
  • Develop new eBPF modules: build new eBPF probes and integrate them into Pulsar through the modules system;
  • Roadmap: check out the plan for next Pulsar releases;
  • Support: join the Discord server for community support.

Contributing

If you're interested in contributing to Pulsar — thank you!

We have a contributing guide which will help you getting involved in the project. Also check the Developers section of the documentation for more information on Pulsar development.

Community

Join the Pulsar Discord server to chat with developers, maintainers, and the whole community. You can also drop any question about Pulsar on the official GitHub discussions or use the GitHub issues for feature requests and bug reports.

License

Pulsar is licensed under two licenses — Pulsar userspace code is licensed under APACHE-2.0. Pulsar eBPF probes are licensed under GPL-2.0.